{"id":13035,"date":"2026-04-29T15:43:31","date_gmt":"2026-04-29T15:43:31","guid":{"rendered":"https:\/\/www.europesays.com\/russia\/13035\/"},"modified":"2026-04-29T15:43:31","modified_gmt":"2026-04-29T15:43:31","slug":"pro-russian-hacker-group-gamifies-cyberattacks-on-europe-with-crypto-rewards-investigation","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/russia\/13035\/","title":{"rendered":"Pro-Russian Hacker Group Gamifies Cyberattacks on Europe With Crypto Rewards \u2013 Investigation"},"content":{"rendered":"<p data-start=\"152\" data-end=\"465\">A pro-Russian hacker group accused by European authorities of carrying out cyberattacks against governments, banks and infrastructure across the West has turned participation in cybercrime into what it calls a \u201cpatriotic online game,\u201d recruiting volunteers through Telegram and rewarding them with cryptocurrency.<\/p>\n<p data-start=\"467\" data-end=\"832\">The group, NoName057(16), has claimed responsibility for waves of distributed denial-of-service (DDoS) attacks on public institutions and private companies across Europe since Russia\u2019s full-scale invasion of Ukraine in 2022. Western intelligence agencies and Europol say the hackers function as part of Russia\u2019s broader hybrid war against countries supporting Kyiv.<\/p>\n<p data-start=\"467\" data-end=\"832\">An investigation by the Poland-based news outlet Vot Tak, conducted with cybersecurity experts from RKS.Global, <a href=\"https:\/\/vot-tak.tv\/92892718\/kto-takie-no-name057-16\" title=\"found\" rel=\"nofollow noopener\" target=\"_blank\">found<\/a> that the group\u2019s activity has not diminished despite a major Europol-led crackdown in July 2025 known as Operation Eastwood.<\/p>\n<p data-start=\"834\" data-end=\"1153\">Instead, the number of attack commands sent to its network of infected devices increased in the months afterward.<\/p>\n<p data-start=\"1155\" data-end=\"1385\">The findings underscore how difficult it is for law enforcement to dismantle decentralized cyber groups that rely on ideology, small financial incentives and thousands of ordinary users turning their own devices into attack tools.<\/p>\n<p>\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.europesays.com\/russia\/wp-content\/uploads\/2026\/04\/Image2-1.png\" alt=\"&#10;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9; &#9;&#9;&#9;&#9;&#9;Screenshot&#9;&#9;&#9;&#9;\"\/><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\tScreenshot<\/p>\n<p data-start=\"1387\" data-end=\"1488\">One of the group\u2019s most visible campaigns came during Denmark\u2019s municipal elections in November 2025. Fearing disruptions, local authorities <a href=\"https:\/\/thedanishdream.com\/danish-society\/politics\/denmark-braces-for-cyberattacks-on-election-day\/\" title=\"installing\" rel=\"nofollow noopener\" target=\"_blank\">installed<\/a> backup generators, printed paper voter lists and bought camping lanterns for polling stations in case of outages.<\/p>\n<p data-start=\"1387\" data-end=\"1488\">The precautions <a href=\"https:\/\/cphpost.dk\/2025-11-17\/business-education\/business-business-education\/the-copenhagen-post-hit-by-hacker-group-attack-ahead-of-local-elections\" title=\"followed\" rel=\"nofollow noopener\" target=\"_blank\">followed<\/a> waves of cyberattacks that temporarily disrupted Danish government websites, political parties, municipal administrations, police services, railway operators and a defense company.<\/p>\n<p data-start=\"1860\" data-end=\"1994\">Responsibility was claimed by NoName057(16), which had warned in a private channel days earlier that Denmark would be its next target.<\/p>\n<p data-start=\"1996\" data-end=\"2117\">The hackers said Denmark was targeted because politicians had increased support for Ukraine during the election campaign.<\/p>\n<p data-start=\"2119\" data-end=\"2414\">The attacks were limited to DDoS operations, in which massive volumes of artificial traffic are directed at websites until they become overloaded and stop responding. Such attacks rarely cause permanent damage, but they can disrupt services for hours or days and create significant public alarm.<\/p>\n<p data-start=\"2416\" data-end=\"2590\">Most Danish websites were quickly restored and the elections were not disrupted. Still, Denmark\u2019s military intelligence service later <a href=\"https:\/\/www.fe-ddis.dk\/globalassets\/fe\/dokumenter\/2025\/-russia-responsible-for-cyber-attacks-.pdf\" title=\"statement\" rel=\"nofollow noopener\" target=\"_blank\">confirmed<\/a>\u00a0NoName057(16) was responsible.<\/p>\n<p data-start=\"2592\" data-end=\"2800\">\u201cThe Russian state uses the group as a tool of its hybrid war against the West,\u201d the intelligence service said. \u201cThe goal is to create instability in targeted countries and punish those that support Ukraine.\u201d<\/p>\n<p data-start=\"2802\" data-end=\"2921\">NoName057(16) first appeared in March 2022, weeks after Russia launched its full-scale invasion of Ukraine.<\/p>\n<p data-start=\"2923\" data-end=\"3123\">Initially focused on Ukrainian media and government websites, it later expanded across Europe and beyond, targeting countries that support Kyiv, including the U.S., Canada, Israel and Taiwan.<\/p>\n<p data-start=\"3125\" data-end=\"3372\">Its manifesto closely mirrors Kremlin narratives, accusing the West of \u201crussophobia,\u201d censorship and support for what it calls \u201cUkrainian terrorists.\u201d The group frames its attacks as retaliation against anti-Russian policies and defense of \u201ctraditional values.\u201d<\/p>\n<p data-start=\"3125\" data-end=\"3372\">In 2026, its campaigns were tied to events including the <a href=\"https:\/\/vot-tak.tv\/tag?tag=%D0%BE%D0%BB%D0%B8%D0%BC%D0%BF%D0%B8%D0%B9%D1%81%D0%BA%D0%B8%D0%B5+%D0%B8%D0%B3%D1%80%D1%8B+2026\" title=\"Milan-Cortina Winter Olympics\" rel=\"nofollow noopener\" target=\"_blank\">Milan-Cortina Winter Olympics<\/a>, new Western military aid packages for Ukraine and the <a href=\"https:\/\/vot-tak.tv\/tag?tag=%D0%B2%D0%BE%D0%B9%D0%BD%D0%B0+%D0%B8%D0%B7%D1%80%D0%B0%D0%B8%D0%BB%D1%8F+%D1%81+%D0%B8%D1%80%D0%B0%D0%BD%D0%BE%D0%BC\" title=\"escalation\" rel=\"nofollow noopener\" target=\"_blank\">escalation<\/a> of conflict between Israel and Iran. During the Israeli-Iranian confrontation, the hackers attacked Israeli websites and described their actions as solidarity with Iran, echoing Russian state messaging.<\/p>\n<p data-start=\"3720\" data-end=\"3841\">The group\u2019s operations rely on software called DDoSia, which experts say is simple enough for non-specialists to install.<\/p>\n<p data-start=\"3843\" data-end=\"4025\">RKS.Global researchers downloaded and analyzed the program for Vot Tak. Available for Windows, Linux, macOS and Android, it can be installed on phones, computers and even routers.<\/p>\n<p data-start=\"4027\" data-end=\"4106\">Once installed, the software effectively turns the device into a participant in cybercrime.<\/p>\n<p data-start=\"4108\" data-end=\"4400\">Users do not choose targets themselves. NoName057(16) administrators send attack configurations from rented control servers, specifying which domains or IP addresses should be hit. After receiving those instructions, the infected device automatically begins generating traffic against the selected targets.<\/p>\n<p data-start=\"4402\" data-end=\"4604\">To join, users contact administrators through a Telegram bot, receive an access key and server address, enter the data into the program and press \u201cStart.\u201d From then on, the process is largely automatic.<\/p>\n<p data-start=\"4606\" data-end=\"4808\">According to RKS.Global, a single infected device can generate hundreds of thousands or even millions of requests per day. When combined across thousands of devices, the traffic creates serious DDoS threats.<\/p>\n<p>\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.europesays.com\/russia\/wp-content\/uploads\/2026\/04\/uid_e1228be9b2ee4a7a8409ab6960a1778c_width_1025_play_0_pos_0_gs_0_height_0.png\" alt=\"&#10;&#9;&#9;&#9;&#9;&#9;Screenshots of recruitment ads on Telegram.&#9;&#9;&#9;&#9;&#9; &#9;&#9;&#9;&#9;&#9;Vot Tak&#9;&#9;&#9;&#9;\"\/><\/p>\n<p>\t\t\t\t\t\t\t\t\tScreenshots of recruitment ads on Telegram.<br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\tVot Tak<\/p>\n<p data-start=\"4810\" data-end=\"4879\">The simplicity of the system has helped NoName057(16) recruit widely.<\/p>\n<p data-start=\"4881\" data-end=\"5079\">The group runs a closed Telegram support chat called DDoSia Project, where participants receive technical help, instructions and access to a reward system based on an internal currency called dCoin.<\/p>\n<p data-start=\"5081\" data-end=\"5240\">Participants earn dCoins depending on the number of \u201csuccessful\u201d requests sent during attacks. The more traffic their devices generate, the more they are paid.<\/p>\n<p data-start=\"5242\" data-end=\"5433\">For example, 500,000 successful requests per day can earn 50 dCoin. One dCoin is worth 2 rubles, or about 2.4 U.S. cents, and can be converted into the TON cryptocurrency and later into cash.<\/p>\n<p data-start=\"5435\" data-end=\"5685\">Users can increase earnings by installing the software on multiple devices or recruiting others through referral links. The system also includes military-style ranks such as private, sergeant and colonel, with the highest level called \u201cGeneral Dosi.\u201d<\/p>\n<p data-start=\"5687\" data-end=\"5769\">Telegram advertisements promote the project as both easy money and patriotic duty.<\/p>\n<p data-start=\"5771\" data-end=\"5956\">Messages reviewed by Vot Tak promised users they could \u201ccarry out DDoS attacks and earn money,\u201d \u201clearn hacking in 15 minutes\u201d or \u201chelp Russia on the information front and get rewarded.\u201d They do not mention that DDoS attacks are criminal offenses, including under Russian law.<\/p>\n<p data-start=\"5771\" data-end=\"5956\">European authorities <a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/global-operation-targets-noname05716-pro-russian-cybercrime-network\" title=\"launched\" rel=\"nofollow noopener\" target=\"_blank\">launched<\/a> Operation Eastwood in July 2025 in a coordinated attempt to dismantle NoName057(16) involving 12 countries and coordinated by Europol.<\/p>\n<p data-start=\"5771\" data-end=\"5956\">Authorities seized more than 100 servers, carried out 24 searches, issued seven arrest warrants and questioned 13 individuals. Three suspects were arrested in <a href=\"https:\/\/apnews.com\/article\/europol-hackers-cybercrime-russia-ukraine-42d98dabdc0182dac4bd4c80d880cdb4\" title=\"France\" rel=\"nofollow noopener\" target=\"_blank\">France<\/a>, <a href=\"https:\/\/elpais.com\/espana\/2025-07-16\/una-operacion-internacional-desmantela-la-infraestructura-de-los-hackers-prorrusos-que-atacaron-espana-por-el-apoyo-a-ucrania.html\" title=\"Spain\" rel=\"nofollow noopener\" target=\"_blank\">Spain<\/a> and Poland.<\/p>\n<p data-start=\"6407\" data-end=\"6592\">Five Russian citizens were added to Europol\u2019s most wanted list. More than 1,000 suspected supporters, including Telegram administrators, also received warnings about criminal liability.<\/p>\n<p data-start=\"6594\" data-end=\"6658\">While authorities said they had dismantled the group\u2019s infrastructure,\u00a0data analyzed by Vot Tak and RKS.Global showed the attacks resumed within days and overall activity increased.<\/p>\n<p data-start=\"6783\" data-end=\"6905\">The group sent an average of about 6,300 attack commands per month before Eastwood, compared to an average of 7,708 afterward.<\/p>\n<p data-start=\"6907\" data-end=\"7071\">In the eight months before the operation, researchers recorded 56,231 attack commands. In the eight months after, from July 2025 to March 2026, they counted 61,666.<\/p>\n<p data-start=\"7073\" data-end=\"7187\">From late October 2025 to mid-March 2026, NoName057(16) claimed 1,530 successful operations, about 300 per month.<\/p>\n<p>\t\tnews<br \/>\n\t\t<a data-id=\"in-article-block\" class=\"related-article__inner\" href=\"https:\/\/www.themoscowtimes.com\/2026\/04\/29\/russian-hackers-targeting-messaging-apps-dutch-spy-agency-says\" title=\"Russian Hackers &#039;Targeting Messaging Apps,&#039; Dutch Spy Agency Says\" rel=\"nofollow noopener\" target=\"_blank\"><\/p>\n<p>\t\t\t\tRussian Hackers &#8216;Targeting Messaging Apps,&#8217; Dutch Spy Agency Says<br \/>\n\t\t\tRead more<br \/>\n\t\t<\/a><\/p>\n<p data-start=\"7189\" data-end=\"7403\">Vot Tak verified that at least some of those attacks were genuine, with targeted websites temporarily inaccessible. Several affected companies and local administrations also confirmed experiencing DDoS disruptions.<\/p>\n<p data-start=\"7405\" data-end=\"7602\">Government websites accounted for nearly one-third of identified targets, according to RKS.Global. Financial institutions, transport and logistics companies, municipalities and telecom operators were also frequent victims.<\/p>\n<p data-start=\"7604\" data-end=\"7790\">Germany became one of the group\u2019s main targets after Operation Eastwood, with hackers openly describing attacks there as revenge for the crackdown.\u00a0<\/p>\n<p data-start=\"7792\" data-end=\"7934\">Poland was also repeatedly targeted, including ministries, city governments, transport systems, defense contractors and industrial facilities.<\/p>\n<p data-start=\"7936\" data-end=\"8122\">Poland\u2019s Digital Affairs Ministry told Vot Tak that the real damage remained limited and said such groups often exaggerate their success online to appear more effective than they are.<\/p>\n<p data-start=\"7936\" data-end=\"8122\">Europol identifies 39-year-old <a href=\"https:\/\/www.bka.de\/DE\/IhreSicherheit\/Fahndungen\/Personen\/BekanntePersonen\/OP_EastW\/BME\/Sachverhalt.html?nn=26874\" title=\"Mikhail Burlakov\" rel=\"nofollow noopener\" target=\"_blank\">Mikhail Burlakov<\/a> and 36-year-old <a href=\"https:\/\/www.bka.de\/DE\/IhreSicherheit\/Fahndungen\/Personen\/BekanntePersonen\/OP_EastW\/LMN\/Sachverhalt.html?nn=26874\" title=\"Maxim Lupin\" rel=\"nofollow noopener\" target=\"_blank\">Maxim Lupin<\/a> as the main coordinators of NoName057(16), accusing them of developing and maintaining DDoSia and paying for the servers used by the network.<\/p>\n<p data-start=\"8324\" data-end=\"8537\">Both men are believed to live in Moscow and both hold senior positions at the state-run Center for the Study and Network Monitoring of the Youth Environment (CISM), according to leaked records reviewed by Vot Tak.<\/p>\n<p data-start=\"8539\" data-end=\"8759\">Officially, CISM monitors harmful online content such as cyberbullying and criminal subcultures. But Vot Tak previously <a href=\"https:\/\/vot-tak.tv\/92037582\/cism-monitoring-molodezhi\" title=\"reported\" rel=\"nofollow noopener\" target=\"_blank\">reported<\/a> that one of its functions was compiling denunciations against Russians for online comments.<\/p>\n<p data-start=\"8761\" data-end=\"8831\">Lupin serves as CISM\u2019s general director, while Burlakov is his deputy.<\/p>\n<p data-start=\"8833\" data-end=\"8861\">Both men denied involvement.<\/p>\n<p data-start=\"8863\" data-end=\"9020\">Burlakov said European authorities had \u201cdragged random people into completely unclear criminal cases\u201d and blamed what he called Western bias and russophobia.<\/p>\n<p data-start=\"9022\" data-end=\"9165\">A Telegram account linked to Lupin\u2019s phone number also denied knowledge of NoName057(16), calling Europol\u2019s accusations \u201csome kind of mistake.\u201d<\/p>\n<p data-start=\"9022\" data-end=\"9165\">Dismantling groups like NoName057(16) is difficult because they are run by professionals who know how to hide infrastructure, mask IP addresses and quickly restore operations if key members remain free, cybersecurity expert Leonid Yuldashev told Vot Tak.<\/p>\n<p data-start=\"9414\" data-end=\"9470\">Still, he said police actions like Operation Eastwood are not meaningless, as they can expose infrastructure, identify devices, provide access to internal communications and disrupt finances.<\/p>\n<p data-start=\"9587\" data-end=\"9689\">\u201cIt also had symbolic value,\u201d Yuldashev said. \u201cIt clearly showed the group that it is being targeted.\u201d<\/p>\n<p data-start=\"9691\" data-end=\"9841\">He said the most effective long-term defense is broader use of DDoS protection systems that filter malicious traffic before it reaches target servers.<\/p>\n<p data-start=\"9843\" data-end=\"9957\">Around 80% of websites already have some level of protection, he said, and the remaining 20% remain highly vulnerable.<\/p>\n<p data-start=\"9959\" data-end=\"10062\" data-is-last-node=\"\" data-is-only-node=\"\">\u201cThat is still a very large number,\u201d Yuldashev said. \u201cAttackers can find such resources automatically.\u201d<\/p>\n<p>A Message from The Moscow Times:<\/p>\n<p>Dear readers,<\/p>\n<p>We are facing unprecedented challenges. Russia&#8217;s Prosecutor General&#8217;s Office has designated The Moscow Times as an &#8220;undesirable&#8221; organization, criminalizing our work and putting our staff at risk of prosecution. This follows our earlier unjust labeling as a &#8220;foreign agent.&#8221;<\/p>\n<p>These actions are direct attempts to silence independent journalism in Russia. The authorities claim our work &#8220;discredits the decisions of the Russian leadership.&#8221; We see things differently: we strive to provide accurate, unbiased reporting on Russia.<\/p>\n<p>We, the journalists of The Moscow Times, refuse to be silenced. But to continue our work, <a href=\"https:\/\/www.themoscowtimes.com\/contribute?utm_source=contribute&amp;utm_medium=article\" title=\"we need your help\" rel=\"nofollow noopener\" target=\"_blank\">we need your help<\/a>.<\/p>\n<p>Your support, no matter how small, makes a world of difference. If you can, please support us monthly starting from just $2. It&#8217;s quick to set up, and every contribution makes a significant impact.<\/p>\n<p>By supporting The Moscow Times, you&#8217;re defending open, independent journalism in the face of repression. Thank you for standing with us.<\/p>\n<p>\n\t\t\t\tContinue\n\t\t\t<\/p>\n<p>\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.europesays.com\/russia\/wp-content\/uploads\/2026\/04\/1775844130_930_payment_icons.png\" alt=\"paiment methods\" width=\"160\"\/><\/p>\n<p>Not ready to support today? <br class=\"hidden-sm-up\"\/>Remind me later.<\/p>\n<p>\u00d7<\/p>\n<p>\t\tRemind me next month<\/p>\n<p>\n\t\t\tThank you! Your reminder is set.\n\t\t<\/p>\n<p>\t\t\tWe will send you one reminder email a month from now. For details on the personal data we collect and how it is used, please see our <a href=\"https:\/\/www.themoscowtimes.com\/page\/privacy-policy\" target=\"_blank\" title=\"privacy policy\" rel=\"nofollow noopener\">Privacy Policy<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"A pro-Russian hacker group accused by European authorities of carrying out cyberattacks against governments, banks and infrastructure across&hellip;\n","protected":false},"author":2,"featured_media":13036,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[1215,1876,5660,214,3161,5],"class_list":{"0":"post-13035","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-russia","8":"tag-cryptocurrency","9":"tag-cybersecurity","10":"tag-denmark","11":"tag-europe","12":"tag-hackers","13":"tag-russia"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/russia\/wp-json\/wp\/v2\/posts\/13035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/russia\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/russia\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/russia\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/russia\/wp-json\/wp\/v2\/comments?post=13035"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/russia\/wp-json\/wp\/v2\/posts\/13035\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/russia\/wp-json\/wp\/v2\/media\/13036"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/russia\/wp-json\/wp\/v2\/media?parent=13035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/russia\/wp-json\/wp\/v2\/categories?post=13035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/russia\/wp-json\/wp\/v2\/tags?post=13035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}